Cyber Security Primer III
Good Security Habits
How can you minimize the access other people
have to your information?
You
may be able to easily identify people who could, legitimately or not, gain
physical access to your computer—family members, roommates, co-workers, members
of a cleaning crew, and maybe others. Identifying the people who could gain
remote access to your computer becomes much more difficult. As long as you have
a computer and connect it to a network, you are vulnerable to someone or
something else accessing or corrupting your information; however, you can
develop habits that make it more difficult.
• Lock your
computer when you are away from it. Even if you only step away from your
computer for a few minutes, it's enough time for someone else to destroy or
corrupt your information. Locking your computer prevents another person from
being able to simply sit down at your computer and access all of your
information.
• Disconnect your
computer from the Internet when you aren't using it. The developments of
technologies such as DSL and cable modems have made it possible for users to be
online all the time, but this convenience comes with risks. The likelihood that
attackers or viruses scanning the network for available computers will target
your computer becomes much higher if your computer is always connected.
Depending on what method you use to connect to the Internet, disconnecting may
mean disabling a wireless connection, turning off your computer or modem, or
disconnecting cables. When you are connected, make sure that you have a
firewall enabled.
• Evaluate your
security settings. Most software, including browsers and email programs, offers
a variety of features that you can tailor to meet your needs and requirements.
Enabling certain features to increase convenience or functionality may leave
you more vulnerable to being attacked. It is important to examine the settings,
particularly the security settings, and select options that meet your needs
without putting you at increased risk. If you install a patch or a new version
of the software, or if you hear of something that might affect your settings, reevaluate
your settings to make sure they are still appropriate.
• Protect your
computer against power surges and brief outages. Aside from providing outlets
to plug in your computer and all of its peripherals, some power strips protect
your computer against power surges. Many power strips now advertise
compensation if they do not effectively protect your computer. Power strips
alone will not protect you from power outages, but there are products that do
offer an uninterruptible power supply when there are power surges or outages.
During a lightning storm or construction work that increases the odds of power
surges, consider shutting your computer down and unplugging it from all power
sources.
• Back up all of your data. Whether or not
you take steps to protect yourself, there will always be a possibility that
something will happen to destroy your data. You have probably already
experienced this at least once— losing one or more files due to an accident, a
virus or worm, a natural event, or a problem with your equipment. Regularly
backing up your data on a CD or network reduces the stress and other negative
consequences that result from losing important information. Determining how
often to back up your data is a personal decision. If you are constantly adding
or changing data, you may find weekly backups to be the best alternative; if
your content rarely changes, you may decide that your backups do not need to be
as frequent. You don't need to back up software that you own on CD-ROM or
DVD-ROM—you can reinstall the software from the original media if necessary
Safeguarding Your Data
Why isn't "more" better?
Maybe
there is an extra software program included with a program you bought. Or
perhaps you found a free download online. You may be tempted to install the programs
just because you can, or because you think you might use them later. However,
even if the source and the software are legitimate, there may be hidden risks.
And if other people use your computer, there are additional risks. These risks
become especially important if you use your computer to manage your personal
finances (banking, taxes, online bill payment, etc.), store sensitive personal
data, or perform work-related activities away from the office. However, there
are steps you can take to protect yourself.
How can you protect both your personal and
work-related data?
• Use and maintain
anti-virus software and a firewall - Protect yourself against viruses and
Trojan horses that may steal or modify the data on your own computer and leave
you vulnerable by using anti-virus software and a firewall. Make sure to keep
your virus definitions up to date.
• Regularly scan
your computer for spyware - Spyware or adware hidden in software programs may
affect the performance of your computer and give attackers access to your data.
Use a legitimate anti-spyware program to scan your computer and remove any of
these files. Many anti-virus products have incorporated spyware detection.
• Keep software up
to date - Install software patches so that attackers cannot take advantage of
known problems or vulnerabilities. Many operating systems offer automatic
updates. If this option is available, you should turn it on.
• Evaluate your
software's settings - The default settings of most software enable all
available functionality. However, attackers may be able to take advantage of
this functionality to access your computer. It is especially important to check
the settings for software that connects to the internet (browsers, email
clients, etc.). Apply the highest level of security available that still gives
you the functionality you need.
• Avoid unused
software programs - Do not clutter your computer with unnecessary software
programs. If you have programs on your computer that you do not use, consider
uninstalling them. In addition to consuming system resources, these programs
may contain vulnerabilities that, if not patched, may allow an attacker to
access your computer.
• Consider
creating separate user accounts - If there are other people using your
computer, you may be worried that someone else may accidentally access, modify,
and/or delete your files. Most operating systems (including Windows, Mac OS, and Linux) give you the option of creating a different user
account for each user, and you can set the amount of access and privileges for
each account. You may also choose to have separate accounts for your work and
personal purposes. While this approach will not completely isolate each area,
it does offer some additional protection. However, it will not protect your
computer against vulnerabilities that give an attacker administrative
privileges. Ideally, you will have separate computers for work and personal
use; this will offer a different type of protection.
• Establish
guidelines for computer use - If there are multiple people using your computer,
especially children, make sure they understand how to use the computer and
internet safely. Setting boundaries and guidelines will help to protect your
data.
• Use passwords
and encrypt sensitive files - Passwords and other security features add layers
of protection if used appropriately. By encrypting files, you ensure that
unauthorized people can't view data even if they can physically access it. You
may also want to consider options for full disk encryption, which prevents a
thief from even starting your laptop without a passphrase. When you use
encryption, it is important to remember your passwords and passphrases; if you
forget or lose them, you may lose your data.
• Follow corporate
policies for handling and storing work-related information - If you use your
computer for work-related purposes, make sure to follow any corporate policies
for handling and storing the information. These policies were likely
established to protect proprietary information and customer data, as well as to
protect you and the company from liability. Even if it is not explicitly stated
in your corporate policy, you should avoid allowing other people, including
family members, to use a computer that contains corporate data.
• Dispose of
sensitive information properly - Simply deleting a file does not completely
erase it. To ensure that an attacker cannot access these files, make sure that
you adequately erase sensitive files.
Real-World Warnings Keep You
Safe Online
Why are these warnings important?
Like
the real world, technology and the internet present dangers as well as
benefits. Equipment fails, attackers may target you, and mistakes and poor
judgment happen. Just as you take precautions to protect yourself in the real
world, you need to take precautions to protect yourself online. For many users,
computers and the internet are unfamiliar and intimidating, so it is
appropriate to approach them the same way we urge children to approach the real
world.
What are some warnings to remember?
• Don't trust candy from strangers -
Finding something on the internet does not guarantee that it is true. Anyone
can publish information online, so before accepting a statement as fact or
taking action, verify that the source is reliable. It is also easy for
attackers to "spoof" email addresses, so verify that an email is
legitimate before opening an unexpected email attachment or responding to a
request for personal information.
• If it sounds too
good to be true, it probably is - You have probably seen many emails promising
fantastic rewards or monetary gifts. However, regardless of what the email
claims, there are not any wealthy strangers desperate to send you money. Beware
of grand promises—they are most likely spam, hoaxes, or phishing schemes. Also
be wary of pop-up windows and advertisements for free downloadable
software—they may be disguising spyware.
• Don't advertise
that you are away from home - Some email accounts, especially within an
organization, offer a feature (called an auto responder) that allows you to
create an "away" message if you are going to be away from your email
for an extended period of time. The message is automatically sent to anyone who
emails you while the auto responder is enabled. While this is a helpful feature
for letting your contacts know that you will not be able to respond right away,
be careful how you phrase your message. You do not want to let potential
attackers know that you are not home, or, worse, give specific details about
your location and itinerary. Safer options include phrases such as "I will
not have access to email between [date] and [date]." If possible, also
restrict the recipients of the message to people within your organization or in
your address book. If your away message replies to spam, it only confirms that
your email account is active. This may increase the amount of spam you receive.
• Lock up your
valuables - If an attacker is able to access your personal data, he or she may
be able to compromise or steal the information. Take steps to protect this
information by following good security practices. Some of the most basic
precautions include locking your computer when you step away; using firewalls,
anti-virus software, and strong passwords; installing appropriate patches; and
taking precautions when browsing or using email.
• Have a backup
plan - Since your information could be lost or compromised (due to an equipment
malfunction, an error, or an attack), make regular backups of your information
so that you still have clean and complete copies. Backups also help you
identify what has been changed or lost. If your computer has been infected, it
is important to remove the infection before resuming your work. Keep in mind
that if you did not realize that your computer was infected; your backups may
also be compromised.
Keeping Children Safe Online
What unique risks are associated with children?
When a
child is using your computer, normal safeguards and security practices may not
be sufficient. Children present additional challenges because of their natural
characteristics: innocence, curiosity, desire for independence, and fear of
punishment. You need to consider these characteristics when determining how to
protect your data and the child.
You
may think that because the child is only playing a game, or researching a term
paper, or typing a homework assignment, he or she can't cause any harm. But
what if, when saving her paper, the child deletes a necessary program file? Or
what if she unintentionally visits a malicious web page that infects your
computer with a virus? These are just two possible scenarios. Mistakes happen,
but the child may not realize what she's done or may not tell you what happened
because she's afraid of getting punished.
Online
predators present another significant threat, particularly to children. Because
the nature of the internet is so anonymous, it is easy for people to
misrepresent themselves and manipulate or trick other users. Adults often fall
victim to these ploys, and children, who are usually much more open and
trusting, are even easier targets. The threat is even greater if a child has
access to email or instant messaging programs, visits chat rooms, and/or uses
social networking sites.
What can you do?
• Be involved
- Consider activities you can work on together, whether it be playing a game,
researching a topic you had been talking about (e.g., family vacation spots, a
particular hobby, a historical figure), or putting together a family
newsletter. This will allow you to supervise your child's online activities
while teaching her good computer habits.
• Keep your
computer in an open area - If your computer is in a high-traffic area, you
will be able to easily monitor the computer activity. Not only does this
accessibility deter a child from doing something she knows she's not allowed to
do, it also gives you the opportunity to intervene if you notice a behavior
that could have negative consequences.
• Set rules and
warn about dangers - Make sure your child knows the boundaries of what she
is allowed to do on the computer. These boundaries should be appropriate for
the child's age, knowledge, and maturity, but they may include rules about how
long she is allowed to be on the computer, what sites she is allowed to visit,
what software programs she can use, and what tasks or activities she is allowed
to do. You should also talk to children about the dangers of the internet so
that they recognize suspicious behavior or activity. The goal isn't to scare
them; it's to make them more aware.
• Monitor
computer activity - Be aware of what your child is doing on the computer,
including which web sites she is visiting. If she is using email, instant
messaging, or chat rooms, try to get a sense of who she is corresponding with
and whether she actually knows them.
• Keep lines of
communication open - Let your child know that she can approach you with any
questions or concerns about behaviors or problems she may have encountered on
the computer.
• Consider
partitioning your computer into separate accounts - Most operating systems
(including Windows, Mac OS, and Linux) give you the option of creating a
different user account for each user. If you're worried that your child may
accidentally access, modify, and/or delete your files, you can give her a
separate account and decrease the amount of access and number of privileges she
has. If you don't have separate accounts, you need to be especially careful
about your security settings. In addition to limiting functionality within your
browser, avoid letting your browser remember passwords and other personal
information. Also, it is always important to keep your virus definitions up to
date.
• Consider
implementing parental controls - You may be able to set some parental controls
within your browser. For example, Internet Explorer allows you to restrict or
allow certain web sites to be viewed on your computer, and you can protect
these settings with a password. To find those options, click Tools on your menu
bar, select Internet Options..., choose the Content tab, and click the
Enable... button under Content Advisor.
Some ISPs offer services designed to protect children online. There are also special software programs you can install on your computer.
Comments
Post a Comment